Network-Based Intrusion Prevention

26th December 2019 | Cybrary Network-Based Intrusion Prevention

IDS

Network-based Intrusion Prevention Services (aka NIPS) is a preemptive approach to network security used to identify potential threats and respond to them swiftly. Like network intrusion detection systems (NIDS), Network-based Intrusion Prevention System (NIPS) monitors network traffic and actively resets connections found to exhibit malicious behaviours before they cause their damage.

Related Terms: Network-based Intrusion Detection Services, Intrusion, Intrusion Detection

Source: CNSSI 4009, ISO/IEC 27039

What does this mean for an SMB?

Network Intrusion Prevention Services (“NIPS”) are an advanced and expensive proposition for it to work properly and effectively within a company’s environment.  It is often used in Data Centers with Cloud Hosting providers to provide a higher level of cybersecurity assurance on their critical networks.  However, in the SMB arena, it is often too expensive to be practical.  Additionally, it provides security services that would only be appropriate if all your Level 1, 2, and 3 cybersecurity maturity services, processes, and policies were in place.  Most SMB’s are not operating with this level of maturity.  Therefore, I seldom recommend NIPS or its less expensive relative NIDS (Network Intrusion Detection Services) in the SMB network space.    Exceptions to this general guidance do apply, especially within regulated industries in high finance, defense contractors seeking high level certifications for example.

To learn more about Intrusion Detection and Protection, watch this short video:

Secure your business with CyberHoot Today!!!

Sign Up Now

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Sneaky Browser Extensions Are Hijacking ChatGPT Sessions

Sneaky Browser Extensions Are Hijacking ChatGPT Sessions

Cyberattacks usually start with phishing emails or weak passwords. This one did not. Security researchers...

Read more
Cybersecurity Leader Uploads Sensitive Files to AI

Cybersecurity Leader Uploads Sensitive Files to AI

Not surprising when Trouble Ensues Last summer, the interim head of a major U.S. cybersecurity agency uploaded...

Read more
Common Google Workspace Security Gaps

Common Google Workspace Security Gaps

And How to Fix Them Let me make an educated guess. You moved to Google Workspace because it was supposed to...

Read more